You are on page 1of 18

Safety Issues on the

Use of ICT including


e-Safety Rules
Safety Issues on the Use of ICT including
e-Safety Rules

Lesson Outcomes:
1. Identified and explain safety issues on the use of ICT
2. Listed and applied e-safety rules in the use of ICT
Using technology is not a risk by itself,
but how it is used will be vulnerable to risks.
When improperly used it will pose danger to
the ears in school and at home. What are
the safety issues that are needed to be
addressed by new policy and guidelines? As
future teachers, do you need to know all of
these?
Some Risks in the Use of ICT and
e-Networking
Technology is a phenomenon that seems to be uncontrollable. Despite the
so many benefits for teaching and learning, there are also negative effects
or influence on the learners. Hence as future teachers you have to be
aware of how to safeguard learners in the school communities where they
spend most of their waking hours and also in their homes or facilities that
provide opportunities to use digital technologies like Internet Cafes.
Safeguard and protection should be the primordial role of parents, teachers
and schools. There are so many risks that we have to be aware of in the
use of digital technologies These may include the following:

1. Exposure to inappropriate content, including on-line pornography,


extremism (exposure to violence associated with racist language)
2. Lifestyle websites like self-harms and suicide sites, and hate sites;
3. Cyber-bullying man in all form receiving sexually explicit
images or messages.
4. Privacy issues including disclosure of personal
information
5. Health and wellbeing (amount of time spent online,
internet gaming and many more;
6. Prolonged exposure to on-line technologies, particularly
to early age
7. Addiction to gambling and gaming;
8. Thief of fraud from activities such as phishing
9. Viruses, Trojans, spyware and other malware, and
10. Social pressure to maintain online networks via texting
and social
networking sites.
Minor Misuse of ICT
In school, some minor misuse made by learners include the
following:

Copying information into Assignment and falling to


acknowledge the source (plagiarism and copyright infringement)
Downloading materials not relevant to their studies
Misconduct associated with subject logins, such as using
someone else’s password
Leaving a mobile phone turned on during class period
Unauthorized taking of pictures or images with mobile phone
camera, still or moving
e-Safety
With all of the above concerns and many more, how do we confront all of these
so as to protect our future generation?

e-safety takes care not only of internet technologies but also of electronic
communications via mobile phones, games consoles and wireless technology. It
highlights the need to educate children and young people about the benefits,
risks and responsibilities of using information technology. Here are some issues
of e-safety:

e-safety helps safeguard children and young people in the digital world;
e-safety emphasize learning to understand and new technologies in positive way;
e-safety educates children about the risks as well as the benefits so we can feel
confident online; and
 e-safety supports young learners and adults to develop safer online behaviors,
both in and out of school.
Network Management
1. Safety of Network in Schools
1.1. Make clear that no one should log on as
another user.
1.2. Require all users to always log off when they
have finished working
1.3. Maintain equipment to ensure health and
safety.
1.4. Provide students with access to content and
resources through guided e-learning
1.5. Set up a clear disaster recovery system in place for
critical data that include secure, remote back up
of critical data
1.6. Secure wireless network to appropriate standards
suitable for educational use.

1.7. Install all computer equipment professionally and


meet health and safety Standards.

1.8. Review the school ICT system regularly with regard


to health and safety and security
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not
permitted to disclose their passwords unless they got permission from the
owner or from the management. The equipment that keeps the personal
information shall be locked when attended to prevent unauthorized access
Computers should be set to 1 time out if they become unused for certain
period of time.

3. Personal mobile phones and mobile devices


3.1 All mobile phones shall be kept away in a box away from the children or
learners and access is only allowed at break time or at the end of classes
or when needed during the class period.

4. Cameras
4.1. Taking pictures only from parents or caregivers and not from any other
family member or friend while the child attends class
4.2. Any picture taken of children shall be on cameras solely for the purpose
Setting Up An Educational Technology
Room
Schools that plan to dedicate a room where the students can access
technologies for learning should include the following basic safety
rules:

1. Provide tiltable tables. These tables can be tilted and adjusted to


the height of the users
2 Provide anti-glare screen filters
3. Provide adjustable chair
4. Provide foot support
5. Make sure lighting is suitable
6. Make sure work stations are not cramped
7. Plan work at a computer so that there are frequent breaks.
More specifically safety rules that can reduce risk
of accidents in the working include stations should:

1. No trailing wires across or around the room which people can trip
on
2. Electrical sockets should not be overloaded.
3. Electrical equipment should be safety-tested at least once a year
4. There should be adequate space around desk for people to move.
5. Bags and obstacles should be stored out of the way.
6. Food and drinks should not be placed near machines.
7. Heating and ventilation should be suitable for the working
environment.
8. Fire extinguishers should be available.
9. Fire exits should be clearly marked and free from clutter.
There are more issues, policies and rules.
What have been presented in the lesson
may be the minimum that you should learn.
As you explore some more and engage in the
different aspects of Technology for Teaching
and Learning, you will find more details
Experience
 
Task 1: Survey of the e-Safety Rules in Schools
Steps:
1. Interview the following persons: ()
ICT Manager
Student
Teacher
where they have e-Safety Rules in their school?
2. Ask the following questions for each:
21. Do you have an ICT facility in the school? What compose this facility?
2.2. Who are allowed to use the facility?
2.3. What are policy, guidelines and rules in the use of the facility?
24. What are the e-safety rules that need to be followed by any user?
 
3. Record all the information Separate the answers of the ICT Manager Students and
Teachers
4. What are common in their answers? What are different?
5. Submit your report and share with the class.
Examine

Task 1- Reflection
 
1. What have I learned?
 
2. What I want to know more?

3. What will I do with what I learned?


 
Task 2- Self Check
Choose the correct answer from the options given:
1. A friend would like to ask for your email password, because your email address was used for an urgent
matter. As a rule in privacy, what action will you take?
 I. Voluntarily give my password to my friend
 Il. Deny the request of my friend even if it is urgent.
 III. Open my email by myself and print the email that is addressed to my friend.
 A. l only C. II only.
 B. II only D. I, II and II
2. Which of these is a minor infraction in the use of digital facility?
 A. Unauthorized taking of pictures or images with mobile phone camera
 B. Logging off when finished working
 C. Making sure that lighting is adequate
 D. Using anti-glare screen filters
3. Which is a risk in the use of ICT, thus a need to establish policies and rules for e-safety
 
 I Prolonged exposure to online technologies, particularly at an early age
 II Cyber bullying in all forms
 III Lifestyle websites like self-harm and suicide and hate sites
 A. I only C. III only
 B. I only D. I, II and III
4. Which is NOT TRUE about e-safety in the use of digital technology
A. Restricts the use of digital technology
B. Facilitates better understanding how to use online facilities
C. Protects young learners and adults from the digital risks
D. Helps users to understand the new technology

5. When working inside a computer laboratory, all of the choices


EXCEPT is allowed. Which one is allowed?
A. Foods and drinks should be handy on the computer table.
B. One external electrical outlet should have 5 computers connected.
C Fire extinguishers should be made available
D. Computer desks should be near each other to allow sharing of
information.
 
Sources:
Purita P. Bilbao, Ed.D. et al.,Technology for Teaching and
Learning 1, Cubao, Quezon City, Metro Manila, Lorimar
Publishing Inc. 2019
http://www.margaret-clitherow-primary.torbay.sch.uk/wp-
content/uploads/2016/11/e-safety-policy.pdf
 
For educational purposes only.

You might also like